Birgit Pfitzmann photo

Research Areas

Contact Information

Birgit Pfitzmann
SIL Cluster Lead ZRL
Zurich Research Laboratory, Zurich, Switzerland
BPFatzurich.ibm.com      +41dash44dash724dash8608


Tab navigation

Short CV

Birgit Pfitzmann is the Lead Services Analytics in the IBM Zurich Research Lab, performing research on analytics-driven IT service management, IT modernization, and migration to cloud. From Oct. 2011 to March 2013, she was responsible for building up a Services Innovation Lab at the IBM Zurich Research Lab. From 2008-Sept. 2011, she led the Galapagos group at the IBM Watson research center, performing research on application-data-dependency discovery and its usage in IT management to business-level objectives and in IT consolidation and migration, e.g., to clouds. She joined IBM in 2001 at the Zurich Research Lab. There she was responsible for research in risk and compliance, identity management, web services security, key management, and formal verification of cryptographic protocols. She has served on various taskforces on defining IBM's technology and strategy in security and privacy, and worked closely with IBM's product and services divisions on bringing these technologies to market.

Before joining IBM, she was a tenured professor and dean of the Department for Computer Science at the University of Saarland in Saarbrcken, one of the top ranked CS departments in Germany. In Saarbrcken she and former students started Sirrix AG, a spin-off company specializing on information security (she is no longer associated with Sirrix). Birgit Pfitzmann is author of more than 100 research papers in security, privacy and cryptography, and regularly serves on the program committees of international conferences on these topics. She was the program chair of Eurocrypt 2001 and the ACM Conference on Computer and Communications Security 2004, and is the co-program chair of the IEEE Symposium on Security and Privacy 2006 and 2007, which are three of the most prestigious international research conferences on these topics. She obtained two Outstanding Technical Achievement Awards and two Outstanding Innovation Awards in IBM, and is a member of the IBM Academy of Technology.

Birgit Pfitzmann received a Diploma in Computer Science from the University of Karlsruhe and a Doctorate from the University of Hildesheim, both in Germany. She is Member of the IACR, where she served on the Board of Directors, and of the ACM and GI, and Senior Member of the IEEE.

Publications

[130] Birgit Pfitzmann, Nikolai Joukov: Migration to Multi-Image Cloud Templates; accepted for 8th IEEE Intern. Conf. on Service Computing (SCC 2011); July 2011, Washington, DC.

[129] Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner and Wietse Venema: Composable Security Analysis of OS Services; 9th International Conference on Applied Cryptography and Network Security (ACNS 2011), Malaga, June 2011.

[128] Birgit Pfitzmann, Nikolai Joukov: Assets for IT Transformation Services; 20th Frontiers in Service Conference; June 2011, Columbus, OH.

[127] Nikolai Joukov, Vasily Tarasov, Joel Ossher, Birgit Pfitzmann, Sergej Chicherin, Marco Pistoia, Takaaki Tateishi: Static Discovery and Remediation of Code-Embedded Resource Dependencies; 12th IFIP/IEEE Intern. Symp. on Integrated Network Management (IM'2011).

[126] HariGovind Ramasamy, Cheng-Lin Tsao, Birgit Pfitzmann, Nikolai Joukov, James W. Murray: Towards Automated Identification of Security Zone Classification in Enterprise Networks; Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE '11), Boston, March 2011, USENIX.

[125] Nikolai Joukov, Birgit Pfitzmann, HariGovind V. Ramasamy, Murthy V. Devarakonda: Application-Storage Discovery; SYSTOR 2010, Haifa, May 2010.

[124] Nikolai Joukov, Birgit Pfitzmann, HariGovind V. Ramasamy, Norbert G. Vogl, Murthy V. Devarakonda, Tryg Ager: ITBVM: IT Business Value Modeler; IEEE International Conference on Services Computing (SCC 2009), Bangalore, Sept. 2009.

[123] David Basin, Felix Klaedtke, Samuel Mller, and Birgit Pfitzmann: Runtime Monitoring of Metric First-order Temporal Properties; Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2008), Dec. 2008.

[122] Murthy V. Devarakonda, Nikolai Joukov, Kostas Magoutis, Birgit Pfitzmann, HariGovind V. Ramasamy, and Norbert G. Vogl: Using Automated Discovery for End-to-End Availability Assessment; DSN Industry Forum, June 2008, Anchorage, USA.

[121] Michael Backes, Birgit Pfitzmann: Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR; International Journal on Information Security 7/1 (2008) 33-54

[120] Michael Backes, Birgit Pfitzmann, Michael Waidner: The reactive simulatability (RSIM) framework for asynchronous systems; Information and Computation 205/12 (2007) 1685-1808.

[119] Birgit Pfitzmann: Multi-layer Audit of Access Rights; 4th VLDB Workshop on Secure Data Management (SDM'07), LNCS 4721, Springer-Verlag, Berlin 2007, 18-32.

[118] Jan Camenisch, Birgit Pfitzmann: Federated Identity Management; in: Milan Petkovic, Willem Jonker (eds.): Security, Privacy and Trust in Modern Data Management, Springer-Verlag, Data-Centric Systems and Applications, Berlin 2007, 213-238.

[117] Michael Backes, Birgit Pfitzmann, Andre Scedrov: Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles; 20th IEEE Computer Security Foundations Symposium (CSF) 2007, 112-124.

[116] Carl Abrams, Jrg von Knel, Samuel Mller, Birgit Pfitzmann, Susanne Ruschka-Taylor; Optimized Enterprise Risk Management; IBM Systems Journal 46/2 (2007) 219-234.

[115] Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner: Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks; 3rd Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2006), LNCS 4357, Springer-Verlag, Berlin 2006, 165-178.

[114] Michael Backes, Birgit Pfitzmann, Michael Waidner: Formal Methods and Cryptography; FM 2006: Formal Methods, LNCS 4085, Springer-Verlag, Berlin 2006, 612-616.

[113] Michael Backes, Birgit Pfitzmann, Michael Waidner: Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes; 11th European Symposium on Research in Computer Security (ESORICS 2006), LNCS 4189, Springer-Verlag, Berlin 2006, 404-423.

[112] Christoph Sprenger, Michael Backes, David Basin, Birgit Pfitzmann, Michael Waidner: Cryptographically Sound Theorem Proving; 19th IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, Washington 2006, 153-166.

[111] Samuel Mller, Birgit Pfitzmann: Effektives Compliance Management; DIGMA – Zeitschrift fr Datenrecht und Informationssicherheit 6/1 (2006) 36-39.

[110] Michael Backes, Birgit Pfitzmann: Cryptographic Key Secrecy of the Strengthened Yahalom Protocol via a Symbolic Security Proof; 21st IFIP TC-11 International Information Security Conference (SEC 2006), Springer-Verlag, New York 2006, 233-245. Preliminary version IBM Research Report RZ 3601 (#99611) 04/18/05.

[109] Samuel Mller, Birgit Pfitzmann: Compliance Management basierend auf Gesetzesformalisierungen – Das REALM-Projekt; 9. Internationales Rechtsinformatik Symposion (IRIS 2006), Richard Boorberg Verlag, Wien, 296-302.

[108] Michael Backes, Sebastian Mdersheim, Birgit Pfitzmann, Luca Vigan: Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario; Foundations of Software Science and Computation Structures (FOSSACS), LNCS 3921, Springer-Verlag, Berlin 2006, 428-445.

[107] Christopher Giblin, Alice Y. Liu, Samuel Mller, Birgit Pfitzmann, Xin Zhou: Regulations Expressed As Logical Models (REALM); 18th Annual Conference on Legal Knowledge and Information Systems (JURIX 2005), IOS Press, Amsterdam, 37-48.

[106] Michael Backes, Birgit Pfitzmann, Michael Waidner: Justifying a Dolev-Yao Model under Active Attacks; Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures, LNCS 3655, Springer-Verlag, 2005, 1-41.

[105] Thomas Gro, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving a WS-Federation Passive Requestor Profile with a Browser Model; 2005 ACM Workshop on Secure Web Services (SWS), ACM Press, 54-64.

[104] Gnter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Service-oriented Assurance – Comprehensive Security by Explicit Assurances; Quality of Protection: Security Measurements and Metrics (QoP 2005), Advances in Information Security, Springer-Verlag, 2006, 13-24.

[103] Thomas Gro, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Browser Model for Security Analysis of Browser-Based Protocols; 10th European Symposium on Research in Computer Security (ESORICS 2005), LNCS 3679, Springer-Verlag, Berlin 2005, 489-508.

[102] Michael Backes, Birgit Pfitzmann: Limits of the Cryptographic Realization of Dolev-Yao-style XOR; 10th European Symposium on Research in Computer Security (ESORICS 2005), LNCS 3679, Springer-Verlag, Berlin 2005, 178-196.

[101] Windsor W. Hsu, Shauchi Ong, Birgit Pfitzmann: Archiv mit Dokumentenversteinerung; DIGMA – Zeitschrift fr Datenrecht und Informationssicherheit 5/2 (2005) 82-84 (invited).

[100] Michael Backes, Birgit Pfitzmann: Relating symbolic and cryptographic secrecy; IEEE Transactions on Dependable and Secure Computing 2/2 (2005) 109-123.

[99] Michael Backes, Birgit Pfitzmann: Relating symbolic and cryptographic secrecy; IEEE Symposium on Security and Privacy 2005, IEEE Computer Society Press, Washington 2004, 171-182.

[98] Michael Backes, Birgit Pfitzmann, Michael Waidner: Reactively Secure Signature Schemes; International Journal of Information Security (IJIS) 4/4 (2005) 242-252.

[97] Michael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric Authentication Within a Simulatable Cryptographic Library; International Journal of Information Security (IJIS) 4/3 (2005) 135-154.

[96] Michael Backes, Birgit Pfitzmann: A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol; IEEE Journal on Selected Areas in Communication (JSAC) 22/10 (2004) 2075-2086.

[95] Thomas Gro, Birgit Pfitzmann: Proving a WS-Federation Passive Requestor Profile; Preproceedings of ACM Secure Web Services Workshop, Washington, October 2004, 1-10 (proceedings to appear in ACM Press)

[94] Michael Backes, Birgit Pfitzmann: Computational Probabilistic Non-Interference; International Journal of Information Security (IJIS) (Springer) 3/1 (2004) 42-60.

[93] Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner: Polynomial Liveness; Journal of Computer Security (JCS) 12/3-4 (2004) 589-618.

[92] Michael Backes, Birgit Pfitzmann, Michael Waidner: Low-level Ideal Signatures and General Integrity Idealization; 7th Information Security Conference (ISC), LNCS 3225, Springer-Verlag, Berlin 2004, 39-51.

[91] Michael Backes, Birgit Pfitzmann: Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library; 17th IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, Washington 2004, 204-218.

[90] Birgit Pfitzmann: Privacy in Enterprise Identity Federation - Policies for Liberty 2 Single Signon; Elsevier Information Security Technical Report (ISTR) 9/1 (2004) 45-58.

[89] Michael Backes, Birgit Pfitzmann, Michael Waidner: A General Composition Theorem for Secure Reactive Systems; 1st Theory of Cryptography Conference (TCC), LNCS 2951, Springer-Verlag, Berlin 2004, 336-354.

[88] Michael Backes, Birgit Pfitzmann: A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol; Foundations of Software Technology and Theoretical Computer Science (FSTTCS 03), LNCS 2914, Springer-Verlag, Berlin 2003, 1-12.

[87] Birgit Pfitzmann, Michael Waidner: Analysis of Liberty Single Signon with Enabled Clients; IEEE Internet Computing 7(6) 2003, 38-44.

[86] Birgit Pfitzmann: Sound Idealizations of Cryptography for Tool-Supported Proofs (Position statement for panel discussion); 1st ACM Workshop on Formal Methods in Security Engineering (FMSE 2003), ACM Press, New York 2003, 64-65.

[85] Michael Backes, Birgit Pfitzmann, Michael Waidner: A Composable Cryptographic Library with Nested Operations; 10th ACM Conference on Computer and Communications Security (CCS), ACM Press, New York 2003, 220-230.

[84] Michael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric Authentication Within a Simulatable Cryptographic Library; 8th European Symposium on Research in Computer Security (ESORICS 2003), LNCS 2808, Springer-Verlag, Berlin 2003, 271-290.

[83] Michael Backes, Birgit Pfitzmann, Matthias Schunter: A Toolkit for Managing Enterprise Privacy Policies; 8th European Symposium on Research in Computer Security (ESORICS 2003), LNCS 2808, Springer-Verlag, Berlin 2003, 162-180 (Won Award for Outstanding Research in Privacy Enhancing Technologies 2004, PET Advisory Board, sponsored by Microsoft).

[82] Michael Backes, Birgit Pfitzmann, Michael Waidner: Reactively Secure Signature Schemes; 6th Information Security Conference (ISC), LNCS 2851, Springer-Verlag, Berlin 2003, 84-95.

[81] Michael Backes, Birgit Pfitzmann, Michael Waidner: Security in Business Process Engineering; International Conference on Business Process Management (BPM '03), LNCS 2678, Springer-Verlag, Berlin 2003, 168-183.

[80] Michael Backes, Birgit Pfitzmann: Intransitive Non-Interference for Cryptographic Purposes; IEEE Symposium on Security and Privacy 2003, IEEE Computer Society Press, Washington 2003, 140-152.

[79] Birgit Pfitzmann, Michael Waidner: Federated Identity-Management Protocols – Where User Authentication Protocols May Go; 11th International Workshop on Security Protocols (Cambridge 2003), LNCS 3364, Springer-Verlag, Berlin 2005, 153-174.

[78] Birgit Pfitzmann: Privacy in Enterprise Identity Federation Policies for Liberty Single Signon; 3rd International Workshop on Privacy Enhancing Technologies (PET 2003), LNCS 2760, Springer-Verlag, Berlin 2004, 189-204.

[77] Birgit Pfitzmann, Michael Waidner: Privacy in Browser-Based Attribute Exchange; ACM Workshop on Privacy in the Electronic Society (WPES) 2002, ACM Press 2003, 52-62.

[76] Michael Backes, Birgit Pfitzmann: Computational Probabilistic Non-Interference; 7th European Symposium on Research in Computer Security (ESORICS 2002), LNCS 2502, Springer-Verlag, Berlin 2002, 1-23.

[75] Michael Backes, Christian Jacobi, Birgit Pfitzmann: Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation; Formal Methods Europe (FME, part of FLoC), LNCS 2391 2391, Springer-Verlag, Berlin 2002, 310-329

[74] Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner: Polynomial Fairness and Liveness; IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, Washington 2002, 160-174.

[73] D. Powell, A. Adelsbach, C. Cachin, S. Creese, M. Dacier, Y. Deswarte, T. McCutcheon, N. Neves, B. Pfitzmann, B. Randell, R. Stroud, P. Verssimo, M. Waidner: MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications); Supplement of the 2001 Int. Conf. on Dependable Systems and Networks, Gteborg, 2001, D32-D35, 2001.

[72] Birgit Pfitzmann, James Riordan, Christian Stble, Michael Waidner, Arnd Weber: Die PERSEUS System-Architektur; Verlliche IT-Systeme, GI-Fachtagung VIS '01, Vieweg, Braunschweig 2001, 1-17.

[71] Birgit Pfitzmann, Michael Waidner: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission; IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Washington 2001, 184-200.

[70] Birgit Pfitzmann (ed.): Proceedings Eurocrypt 2001, LNCS 2045, Springer-Verlag, Berlin 2001.

[69] Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Optimized Self-Synchronizing Mode of Operation; 8th International Workshop on Fast Software Encryption (FSE), LNCS, Springer-Verlag, Berlin 2001, 78-91.

[68] Birgit Pfitzmann, Ahmad-Reza Sadeghi: Anonymous Fingerprinting with Direct Non-Repudiation; Asiacrypt 2000, LNCS 1976, Springer-Verlag, Berlin 2000, 401-414.

[67] Birgit Pfitzmann, Michael Waidner: Composition and Integrity Preservation of Secure Reactive Systems; 7th ACM Conference on Computer and Communications Security (CCS), ACM Press, New York 2000, 245-254.

[66] Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Cryptographic Security of Reactive Systems; DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS), March 2000, http://www.elsevier.nl/locate/entcs/volume32.html.

[66] Grard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner (ed.) SEMPER - Secure Electronic Marketplace for Europe; LNCS 1854, Springer-Verlag, Berlin 2000.

Also coauthor of Part I: Birgit Baum-Waidner, Grard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner, Arnd Weber: The Vision of SEMPER; 3-37

and Ch. 6: N. Asokan, Birgit Baum-Waidner, Torben Pedersen, Birgit Pfitzmann, Matthias Schunter, Michael Steiner, Michael Waidner: Architecture; 45-63.

[65] Birgit Pfitzmann, Ahmad-Reza Sadeghi: Self-Escrowed Cash Against User Blackmailing; 4th International Conference on Financial Cryptography (FC 2000), LNCS 1962, Springer-Verlag, Berlin 2001, 42-52.

[64] Jrgen Guth, Birgit Pfitzmann: Error- and Collusion-Secure Fingerprinting for Digital Data; 3rd International Information Hiding Workshop (IHW '99), LNCS 1768, Springer-Verlag, Berlin 2000, 134-145.

[63] Andr Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving Ownership of Digital Content; 3rd International Information Hiding Workshop (IHW '99), LNCS 1768, Springer-Verlag, Berlin 2000, 117-133.

[62] Birgit Pfitzmann, Ahmad-Reza Sadeghi: Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Mnzsystemen; Verlliche IT-Systeme, GI-Fachtagung VIS '99, DuD Fachbeitrge, Vieweg, Braunschweig 1999, 35-48.

[61] Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trustworthy User Devices; in: Gnter Mller, Kai Rannenberg (ed.): Multilateral Security in Communications, Vol. 3: Technology, Infrastructure, Economy; Addison-Wesley, Mnchen 1999, 137-156.

[60] Birgit Pfitzmann, Ahmad-Reza Sadeghi: Coin-Based Anonymous Fingerprinting; Eurocrypt '99, LNCS 1592, Springer-Verlag, Berlin 1999, 150-164.

[59] Birgit Pfitzmann, Matthias Schunter: Die SEMPER Sicherheitsarchitektur fr elektronischen Handel im Internet; Magazin Forschung 1/1999, Universitt des Saarlandes 1999, 22-26.

[58] Birgit Pfitzmann, Michael Waidner: Digital Signatures; to appear in Encyclopedia of Distributed Computing (ed.: Joseph Urban, Partha Dasgupta), Kluwer Academic Publishers, should have been 1998 (invited, http://cactus.eas.asu.edu/EDC/).

[57] Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest: Self-Delegation with Controlled Propagation – or – What If You Lose Your Laptop; Crypto '98, LNCS 1462, Springer-Verlag, Berlin 1998, 153-168.

[56] Ivan Damgrd, Birgit Pfitzmann: Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP; 25th International Colloquium on Automata, Languages and Programming (ICALP), LNCS 1443, Springer-Verlag, Berlin 1998, 772-783.

[55] Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Optimal Efficiency of Optimistic Contract Signing; 17th Symposium on Principles of Distributed Computing (PODC), ACM, New York 1998, 113-122.

[54] Birgit Pfitzmann, Michael Waidner: Kopierschutz durch asymmetrisches Fingerprinting; Datenschutz und Datensicherheit DuD 22/5 (1998) 258-264 (invited).

[53] Ivan B. Damgrd, Torben P. Pedersen, Birgit Pfitzmann: Statistical Secrecy and Multi-Bit Commitments; IEEE Transactions on Information Theory 44/3 (1998) 1143-1151.

[52] Anja Jerichow, Jan Mller, Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol; IEEE Journal on Selected Areas in Communications 16/4 (1998) 495-509.

[51] Birgit Pfitzmann, Michael Waidner: How to Break "Fraud-Detectable Key-Escrow"; Operating Systems Review 32/1 (1998) 23-28.

[50] Birgit Pfitzmann, Michael Waidner: Kopierschutz durch asymmetrische Schlsselkennzeichnung mit Signeten; Verlliche IT-Systeme, GI-Fachtagung VIS '97, Vieweg, Braunschweig 1997, 17-32.

[49] Birgit Pfitzmann, Michael Waidner: Strong Loss Tolerance of Electronic Coin Systems; ACM Transactions on Computer Systems 15/2 (1997) 194-213.

[48] Niko Baric, Birgit Pfitzmann: Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees; Eurocrypt '97, LNCS 1233, Springer-Verlag, Berlin 1997, 480-494.

[47] Birgit Pfitzmann, Michael Waidner: Anonymous Fingerprinting; Eurocrypt '97, LNCS 1233, Springer-Verlag, Berlin 1997, 88-102.

[46] Ivan B. Damgrd, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures; Journal of Cryptology 10/3 (1997) 163-194.

[45] Torben P. Pedersen, Birgit Pfitzmann: Fail-stop Signatures; SIAM Journal on Computing 26/2 (1997) 291-330.

[44] Birgit Pfitzmann, Michael Waidner: Asymmetric Fingerprinting for Larger Collusions; 4th ACM Conference on Computer and Communications Security (CCS), 151-160.

[43] Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trusting Mobile User Devices and Security Modules; IEEE Computer 30/2 (1997) 61-68.

[42] Birgit Pfitzmann: Digital Signature Schemes – General Framework and Fail-Stop Signatures; LNCS 1100, Springer-Verlag, August 1996, 396 pages.

[41] Birgit Pfitzmann (collected by): Information Hiding Terminology – Results of an informal plenary meeting and additional proposals; Information Hiding, LNCS 1174, Springer-Verlag, Berlin 1996, 347-350.

[40] Birgit Pfitzmann: Trials of Traced Traitors; Information Hiding, LNCS 1174, Springer-Verlag, Berlin 1996, 49-64.

[39] Birgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting; Eurocrypt '96, LNCS 1070, Springer-Verlag, Berlin 1996, 84-95.

[38] Birgit Pfitzmann: Sorting Out Signature Schemes; CWI Quarterly 8/2 (1995) 147-172 (invited; appeared March 1996).

[37] Hannes Federrath, Anja Jerichow, Andreas Pfitzmann, Birgit Pfitzmann: Mehrseitig sichere Schlsselerzeugung; Proc. Arbeitskonferenz Trust Center 95, DuD Fachbeitrge, Vieweg, Wiesbaden 1995, 117-131.

[36] Birgit Pfitzmann, Matthias Schunter, Michael Waidner: How to Break Another "Provably Secure" Payment System; Eurocrypt '95, LNCS 921, Springer-Verlag, Berlin 1995, 121-132.

[35] Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Vertrauenswrdige portable Benutzerendgerte und Sicherheitsmodule; VIS 95 (GI-Fachtagung Verlliche Informations systeme, Rostock), Vieweg, Braunschweig 1995, 329-350.

[34] Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Stig Mjlsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmaker, Luc Valle, Michael Waidner: Digital Payment Systems in the ESPRIT Project CAFE; Securicom 94, Paris, 1.-3.6.1994, 35-45.

Revision in: Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjlsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Valle, Michael Waidner: The ESPRIT Project CAFE – High Security Digital Payment Systems; 3rd European Symposium on Research in Computer Security (ESORICS 94), LNCS 875, Springer-Verlag, Berlin 1994, 217-230.

[33] Birgit Pfitzmann: Breaking an Efficient Anonymous Channel; Eurocrypt '94, LNCS 950, Springer-Verlag, Berlin 1995, 332-340.

[32] Ivan B. Damgrd, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures; Crypto '93, LNCS 773, Springer-Verlag, Berlin 1994, 250-265.

[31] Birgit Pfitzmann: Sorting Out Signature Schemes; 1st ACM Conference on Computer and Communications Security (CCS), 3.-5.11.1993, Fairfax, acm press 1993, 74-85.

[30] Eugne van Heijst, Torben Pedersen, Birgit Pfitzmann: New Constructions of Fail-Stop Signatures and Lower Bounds; Crypto '92, LNCS 740, Springer-Verlag, Berlin 1993, 15-30.

[29] Birgit Pfitzmann, Michael Waidner: Attacks on protocols for server-aided RSA computation; Eurocrypt '92, LNCS 658, Springer-Verlag, Berlin 1993, 153-162.

[28] Andreas Ort, Ralf Amann, Gerrit Bleumer, Manfred Bttger, Dirk Fox, Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Schutz in verteilten Systemen durch Kryptologie – Ein Praktikum im Informatik-Hauptstudium; Datenschutz und Datensicherung DuD 16/11 (1992) 571-579.

[27] Birgit Pfitzmann, Michael Waidner: Unconditional Byzantine Agreement for any Number of Faulty Processors; STACS '92, LNCS 577, Springer-Verlag, Berlin 1992, 339-350.

[26] Birgit Pfitzmann, Michael Waidner: How to Break and Repair a "Provably Secure" Untraceable Payment System; Crypto '91, LNCS 576, Springer-Verlag, Berlin 1992, 338-350.

[25] David Chaum, Eugne van Heijst, Birgit Pfitzmann: Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer; Crypto '91, LNCS 576, Springer-Verlag, Berlin 1992, 470-484.

[24] Birgit Pfitzmann: Fail-stop Signatures; Principles and Applications; invited talk, Proc. Compsec '91, 8th world conference on computer security, audit and control, Elsevier, Oxford 1991, 125-134.

[23] Birgit Pfitzmann: Neu und sicher: Digitale Fail-stop-Signaturen; KES – Zeitschrift fr Kommunikations- und EDV-Sicherheit 7/5 (1991) 321-326.

[22] Birgit Pfitzmann, Michael Waidner: Fail-stop Signatures and their Application; SECURICOM 91; 9th Worldwide Congress on Computer and Communications Security and Protection, 20. - 22. March 1991, Paris La Dfense, 145-160.

[21] Dirk Fox, Birgit Pfitzmann: Effiziente Software-Implementierung des GMR-Signatursystems; Proc. GI-Fachtagung Verlliche Informationssysteme (VIS'91), March 1991, Darmstadt, Informatik-Fachberichte 271, Springer-Verlag, Heidelberg 1991, 329-345.

[20] Birgit Pfitzmann, Michael Waidner: Unbedingte Unbeobachtbarkeit mit kryptographischer Robustheit; Proc. GI-Fachtagung Verlliche Informationssysteme (VIS'91), March 1991, Darmstadt, Informatik-Fachberichte 271, Springer-Verlag, Heidelberg 1991, 302-320.

[19] Birgit Pfitzmann, Michael Waidner: Fail-stop-Signaturen und ihre Anwendung; Proc. GI-Fachtagung Verlliche Informationssysteme (VIS'91), March 1991, Darmstadt, Informatik-Fachberichte 271, Springer-Verlag, Heidelberg 1991, 289-301.

[18] Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Datenschutz garantierende offene Kommunikationsnetze; Teletech NRW, an initiative of Nordrhein-Westfalen; March 1991, paper for Talk 2, presentation at CeBIT'91.

Revisions in: Dokumentation des Fachseminars "Programm-Manipulationen in Netzen", SYSTEMS 91, Mnchen; Deutsche Informatik-Akademie, Bonn, October 1991

and: Vernetzte Systeme und Sicherheit der Informationsverarbeitung, Deutsche Informatik Akademie, Material for a tutorial at the GI-Jahrestagung 1992, Karlsruhe, 75-120

and: Dokumentation Fachseminar Sicherheit in Netzen, Oct. 21, 1993, SYSTEMS 93, Mnchen, 75-121.

[17] Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: ISDN-MIXes – Untraceable Communication with very small Bandwidth Overhead; Proc. Kommunikation in verteilten Systemen, Feb. 1991, Mannheim, Informatik-Fachberichte 267, Springer-Verlag, Heidelberg 1991, 451-463.

Slightly extended in: Information Security, Proc. IFIP/Sec'91, May 1991, Brighton, D. T. Lindsay, W. L. Price (eds.), North-Holland, Amsterdam 1991, 245-258.

[16] Birgit Baum-Waidner, Birgit Pfitzmann, Michael Waidner: Unconditional Byzantine Agreement with Good Majority, STACS '91, LNCS 480, Springer-Verlag, Heidelberg 1991, 285-295.

[15] Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner: A Remark on a Signature Scheme where Forgery can be Proved; Eurocrypt '90, LNCS 473, Springer-Verlag, Berlin 1991, 441-445.

[14] Andreas Pfitzmann, Birgit Pfitzmann: Technical Aspects of Data Protection in Health Care Informatics; invited talk, AIM EUROFORUM, Dec. 13-15, 1990, Sevilla, Proceedings published by the Commission of the EU, DG XIII, 119-132.

Revision in: Advances in Medical Informatics, J. Noothoven van Goor and J. P. Christensen (Eds.), IOS Press, Amsterdam 1992, 368-386

[13] Birgit Pfitzmann, Michael Waidner, Andreas Pfitzmann: Rechtssicherheit trotz Anonymitt in offenen digitalen Systemen; Datenschutz und Datensicherung DuD 14/5-6 (1990) 243-253, 305-315.

[12] Birgit Pfitzmann, Andreas Pfitzmann: How to Break the Direct RSA-Implementation of MIXes; Eurocrypt '89, LNCS 434, Springer-Verlag, Berlin 1990, 373-381.

[11] Andreas Pfitzmann, Birgit Pfitzmann: Security in Medical Networks; Handling Health Data in the Future - AIM Working Conference on Data Protection and Confidentiality in Health Informatics (Commission of the European Communities); March 19-21, 1990, Brussels.

[10] Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Telefon-MIXe: Schutz der Vermittlungsdaten fr zwei 64-kbit/s-Duplexkanle ber den (264 + 16)-kbit/s-Teilnehmeranschlu; Datenschutz und Datensicherung DuD /12 (1989) 605-622.

[9] Michael Waidner, Birgit Pfitzmann: Loss-tolerant Electronic Wallet; Proceedings Smart Card 2000, Amsterdam, Oct. 4-6, 1989.

Extended version: Loss-Tolerance for Electronic Wallets; FTCS 20, June 26-28, 1990, Newcastle upon Tyne (UK), 140-147.

[8] Birgit Pfitzmann, Andreas Pfitzmann: Anmerkungen zu "Matthias Leclerc: Schlsselmanagement durch Teilschlssel, DuD 12/88"; Datenschutz und Datensicherung DuD /3 (1989) 116.

[7] Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Garantierter Datenschutz fr zwei 64-kbit/s-Duplexkanle ber den (264 + 16)-kbit/s-Teilnehmeranschlu durch Telefon-MIXe; Volume 3 of 4th SAVE-Tagung, April 19-21, 1989, Kln, 1417-1447.

[6] Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN; PIK, Praxis der Informationsverarbeitung und Kommunikation 11/1 (1988) 5-7.

[5] Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Datenschutz garantierende offene Kommunikationsnetze; Informatik-Spektrum 11/3 (1988) 118-142.

[4] Michael Waidner, Birgit Pfitzmann: Verlusttolerante elektronische Brieftaschen; 3rd International Conference on Fault-Tolerant Computing-Systems, IFB 147, Springer-Verlag, Berlin 1987, 36-50;

Revision in: Datenschutz und Datensicherung DuD /10 (1987) 487-497.

[3] Michael Waidner, Birgit Pfitzmann, Andreas Pfitzmann: Über die Notwendigkeit genormter kryptographischer Verfahren; Datenschutz und Datensicherung DuD /6 (1987) 293-299.

[2] Birgit Pfitzmann, Michael Waidner, Andreas Pfitzmann: Rechtssicherheit trotz Anonymitt in offenen digitalen Systemen; Computer und Recht 3/10,11,12 (1987) 712-717, 796-803, 898-904.

[1] Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Technischer Datenschutz in diensteintegrierenden Digitalnetzen - Warum und wie?; Datenschutz und Datensicherung DuD /3 (1986) 178-191.